Category Archives: Apple

At WWDC 2025, Apple Unveils Liquid Glass and Previews New OS Features

Apple’s Worldwide Developer Conference keynote was a lightning-fast 92-minute tour of Apple’s vision for how we’ll use its products in the next year. Apple wove two themes through the presentation: the new Liquid Glass design language will provide a consistent look and feel across all its platforms, and Apple Intelligence-powered features will continue to appear throughout the ecosystem. The other overarching news is that Apple is adopting a new annual versioning approach, similar to car model years, so the version number for each operating system will be 26.

Apple previewed numerous features during the keynote and listed even more on its website afterward. Below, we’ll focus on those we think will make the most difference to your Apple experience, but we also encourage you to read Apple’s pages for each platform to learn more about what’s coming. Those are linked here, along with basic hardware requirements, so you can determine if your devices will be eligible to upgrade this fall:

  • macOS 26 Tahoe: MacBook Air with Apple silicon (2020 and later), MacBook Pro with Apple silicon (2020 and later), MacBook Pro (16‑inch, 2019), MacBook Pro (13‑inch, 2020, four Thunderbolt 3 ports), iMac (2020 and later), Mac mini (2020 and later), Mac Studio (2022 and later), Mac Pro (2019 and later)
  • iOS 26: iPhone SE (2nd generation), iPhone 11, and later
  • iPadOS 26: iPad (8th generation and later), iPad mini (5th generation and later), iPad Air (3rd generation and later), iPad Pro 11‑inch (1st generation and later), iPad Pro 12.9‑inch (3rd generation and later), and iPad Pro (M4)
  • watchOS 26: Apple Watch SE (2nd generation), Apple Watch Series 6 and later, and Apple Watch Ultra and later
  • visionOS 26: All Vision Pro headsets
  • tvOS 26: Apple TV 4K

First, let’s look at Liquid Glass, after which we’ll examine a handful of changes we think Apple users will find most interesting.

Liquid Glass Gives Apple’s Platforms a Fresh Look

Apple’s last major interface redesign occurred in 2013 with the release of iOS 7. Since then, the company’s hardware and graphics technologies have advanced significantly, enabling the new Liquid Glass interface design. It brings to life a new glass-like “material” for interface elements that blurs the line between the physical and the virtual. Liquid Glass is both translucent and malleable, allowing background content to refract through the controls, which can morph, flex, and illuminate in response to user interaction.

Liquid Glass encompasses all of Apple’s platforms and extends to every aspect of the interface, including controls, navigation bars, tabs and sidebars, alerts, widgets, icons, the menu bar, and the Dock. Functionally, Apple has taken the opportunity to improve some interactions, so alerts appear from where you tap rather than taking over the entire display, and context menus expand into scannable lists rather than requiring awkward horizontal scrolling. When you interact with toolbars or other controls, they expand and become more prominent, but as soon as you’re done, they minimize themselves to let you focus on the content. Watch Apple’s intro video to get a feel for it.

The main concern with Liquid Glass is that it may lack contrast and be difficult to read for those whose vision isn’t perfect. In the past, Apple has provided a Reduce Transparency option in the Accessibility settings for macOS, iOS, and iPadOS to eliminate any color bleeding through translucent menus and dialogs; we’ll see if such an option proves necessary for some.

iPadOS 26 Takes Lessons from macOS

Ever since the introduction of the iPad, people have been frustrated by the extent to which it was a larger iPhone rather than a smaller, touch-sensitive Mac. Apple took small steps toward enhancing productivity by adding features like Slide Over and Split View, but they were fussy to use and never achieved widespread acceptance. With iPadOS 26, Apple has finally acknowledged that the iPad should just work more like a Mac. To that end, iPadOS 26 will offer Mac-like features in the following areas:

  • Window management: Every app can now be transformed into a standalone window that you can move and resize freely. Windows remember their size and position, and you can tile them flexibly, with options to split the screen into two, three, or four sections. The familiar traffic light window controls from the Mac reappear along with the macOS Move & Resize and Fill & Arrange options. Swiping up invokes Exposé, allowing you to view all windows and switch to your desired one easily.
  • Menu bar and Dock: iPadOS gains a menu bar that looks and works like the one on the Mac, but it only appears when you swipe down from the top of the screen. You can also put folders in the Dock and access their contents in much the same way docked folders appear as a stack on the Mac.
  • Filesystem access: The Files app resembles a Finder window much more now, thanks to the addition of collapsible folders and resizable columns. It allows you to select which apps will open specific document types and even modify the defaults. Additionally, you can customize folders with colors and icons.
  • Preview makes the move: One of the core Mac apps, Preview, is coming to the iPad. Just as on the Mac, you can use Preview for viewing and editing images and PDFs, and it offers full support for the Apple Pencil.
  • Background processing: Computationally intensive processes and other activities that take a long time, like exporting edited videos and downloading large files, can now run in the background while you engage in other tasks.

Apple Intelligence Expands Across the Ecosystem

Apple Intelligence has been far from a rousing success, with Apple’s failure to deliver last year’s promised update to Siri being the most prominent misstep. But Apple isn’t giving up and will be tapping into Apple Intelligence in many more places across all its operating systems and apps.

Even more important, the company announced that it is opening Apple Intelligence to developers, so we can expect to see features powered by Apple’s on-device large language models appearing in third-party apps this fall. That’s a big deal because Apple’s models provide fast response times, prioritize privacy, and incur no per-prompt costs.

Some of the new and expanded uses of Apple Intelligence include:

  • Visual Intelligence: You can now use Visual Intelligence to learn more about and act on information displayed on your iPhone screen. You could research a piece of clothing you see while browsing, or create a calendar event based on a social media banner. You can also ask ChatGPT about anything you see on screen.
  • Shortcuts gets Apple Intelligence: New intelligence actions in Shortcuts enable you to leverage Apple Intelligence to summarize text, create images, and more. Interestingly, shortcuts can even access Apple Intelligence’s Private Cloud Compute for more power-intensive tasks.
  • Image Playground & ChatGPT: When using Image Playground, you can create images in a wider variety of styles with ChatGPT.
  • Combine emoji for Genmoji: Previously, you could use text descriptions to create custom Genmoji; now, you can make them by combining existing emoji.
  • Messages backgrounds: Chats in Messages will offer shared backgrounds, and users can create custom backgrounds with Image Playground.
  • Messages polls: Group chats in Messages will gain polls—where should we go for dinner tonight?—and Apple Intelligence will automatically detect when a poll might be helpful and suggest one.
  • Wallet order details: With Apple Intelligence, the Wallet app can identify and summarize order details, including tracking information.
  • Workout Buddy: In the watchOS 26 Workout app, Apple Intelligence powers a virtual workout buddy that talks to you while you exercise, offering motivation, real-time stats, and post-workout feedback.

These new applications of Apple Intelligence may not rock your world, but together, they offer some appreciated enhancements. We also look forward to seeing how developers leverage Apple Intelligence models in innovative ways.

Live Translation Edges Toward the Universal Translator

Perhaps the most significant additional feature driven by Apple Intelligence in the new operating systems is Live Translation. It’s integrated into the Phone, FaceTime, and Messages apps. In the Phone app, you get spoken translations between supported languages. In FaceTime, you see the other person’s translated text as a caption, and Messages translates their text. Live Translations may prove to be a lifesaver on your next international trip.

Spotlight Gains Enhanced Capabilities

Whenever you do a search on the Mac, you’re using Spotlight. It can also search within apps like Contacts and Calendar, access various online sources, open documents, launch apps, and more. Despite that, Spotlight has paled in comparison to launchers like Alfred, LaunchBar, and Raycast. No more.

In Apple’s new operating systems, Spotlight will enable users to perform hundreds of actions across various apps. It will also be capable of understanding what you’re working on and suggesting relevant files, apps, or actions. For instance, you’ll be able to start a timer, create calendar events, generate a new email message with pre-filled fields, play a podcast episode, and more.

Spotlight also introduces the concept of “quick keys,” which are short, custom mnemonics for specific actions. For instance, you might type sm to trigger Spotlight to send a message or ar to add a reminder.

In addition, Spotlight becomes a clipboard manager, providing access to recently copied items, including text, images, and links. You can browse, search, and insert previous clipboard entries directly through Spotlight.

Phone App Introduces Call Screening and Hold Assist

Phone calls may not be the primary use of the iPhone for many people, but they remain a fact of life. With iOS 26, Apple has introduced two features that, if they work as promised, will alleviate two common pain points associated with calls.

Call Screening builds on the Live Voicemail feature by automatically answering calls from unknown numbers, without even alerting you. Once the caller provides their name and the reason for their call, the Phone app rings and presents information to help you decide whether to answer.

The other new feature is Hold Assist, which automatically detects hold music and asks if you want it to wait on hold for you, allowing you to attend to other tasks. When someone on the other end picks up, it informs them that you’ll be there shortly and notifies you that it’s time to return to the call.

Although we think of using the Phone app exclusively on the iPhone, Apple is also bringing it to macOS 26 and iPadOS 26, thanks to Continuity. Once you upgrade, you’ll be able to take advantage of these features—and Live Translation—on those platforms as well.

Dismiss Notifications with the Flick of a Wrist

Finally, watchOS 26 introduces a new gesture that we believe will be popular: the wrist flick. Whenever a notification appears on screen, you can quickly rotate your wrist away from you to dismiss it. This feature is a great little addition to the Apple Watch interaction model.

If none of these changes seem earthshaking to you, we agree. With six operating systems and billions of users, Apple can’t move as quickly as smaller companies. While Liquid Glass will dramatically change the look of our Apple devices, the other new features shouldn’t require us to learn completely new methods of interaction.

(Featured image by Apple)

Why Passkeys Are Better than Passwords (And How to Use Them)

No one likes passwords. Users find managing them annoying, and website managers worry about login credentials being stolen in a data breach. The industry has developed a better solution: passkeys.

Passwords versus Passkeys

Traditional multi-factor authentication involves three methods of authentication, at least two of which are required for protection. They include something you know (a password), something you have (usually a code from an authenticator app or text message), and something you are (biometric authentication). Most systems primarily use the first two, but that leaves room for attack because someone could acquire your password and an authentication code through nefarious means.

Passkeys change the model. Instead of how passwords and codes use words and numbers that can be copied and shared, passkeys are pairs of cryptographic keys: a public key and a private key. Websites keep the public key, and the private key is stored securely within an encrypted vault, such as in iCloud Keychain or a 1Password vault. Authenticating with a website requires providing the private key that matches the account’s public key, something that Apple users with modern devices can usually initiate with Touch ID or Face ID.

Instead of generating security with something you have and something you know, passkeys rely on possession (do you have the device?) and presence (are you physically in front of the device?). This approach is fundamentally more secure than passwords because the private key can’t be phished, copied, or used remotely, and you must be physically present to unlock your device. Nor can you be tricked into providing a passkey to a malicious website. (Neither approach protects against physical coercion.)

Where Can You Use Passkeys?

In practice, since you use passkeys primarily to sign into websites, passkeys are stored alongside account details in your password manager. For Apple users, Safari (in iOS 16 or macOS 13 Ventura and later) with Apple’s Passwords app provides the most integrated passkey experience. However, most independent password managers, such as 1Password, Bitwarden, and Dashlane, also enable you to store, share, and enter passkeys and can take over for or work alongside Apple’s Passwords. They provide consistent passkey functionality across all major Web browsers, although experiences may vary slightly due to differences in how they handle authentication prompts and platform integration.

You’ll also find robust support in the Password Manager built into Google Chrome and other Chromium-based browsers, including Arc, Brave, Edge, Opera, and Vivaldi. Firefox’s native passkey support is more limited, but third-party password managers work well with Firefox. 

Although website support for passkeys was initially slow, an increasing number of sites now support them. That includes the big three of Apple, Google, and Microsoft, of course, as well as Amazon, Best Buy, Discord, eBay, GitHub, Intuit, Netflix, Notion, PayPal, Robinhood, Stripe, Target, Walmart, and WhatsApp.

Setting Up Passkeys

The process of setting up passkeys varies a little by website, but is generally remarkably easy. You may be prompted to create a passkey while signing in, or you may need to navigate to the security options associated with your account.

Google offers both approaches. Setting up a passkey for a Google Account can be as simple as agreeing to do so while logging in. If you’re already logged in, Google’s Passkeys and security keys page lets you make one. Once you click Create a Passkey, you’ll be prompted to save it in either Apple’s Passwords or another password manager like 1Password. That’s it.

Note that if you use both Passwords and another password manager, you can save the passkey in only one, and only that one can use it to sign in later. However, most sites that support passkeys let you add multiple passkeys, so you could save separate passkeys in different password managers.

Signing in with Passkeys

Similarly, using a passkey to sign in is trivially simple. You navigate to the website’s login page, enter your username, choose the passkey sign-in option if necessary, and then authenticate.

Exactly how you authenticate depends on the device you’re using and your password manager. On the Mac, Passwords will ask you to use Touch ID if available (above) or a dialog otherwise (below, left). 1Password, once unlocked for the session, presents a dialog with a Sign In button (below right).

On the iPhone and iPad, an authentication dialog appears at the bottom of the screen asking if you want to sign in with your passkey. Tap Continue and authenticate with Face ID or Touch ID (with a fallback to your passcode if necessary).

Unsurprisingly, Apple makes it particularly easy to sign in to Apple websites like iCloud.com using a passkey. As soon as you navigate to such a site in Safari, the device prompts you to sign in using your current Apple Account username and an implicit passkey.

When using other browsers or another Mac that lacks access to your passkey, selecting the passkey sign-in option displays a QR code that you need to scan with an iPhone or iPad that has the passkey stored on it.

Managing and Sharing Passkeys

As noted, passkeys are stored in accounts managed by a password manager. In fact, passkeys are currently stored alongside passwords in each account. There’s nothing to see or edit, although you can delete passkeys like any other data. Although deleting the passkey on your device guarantees that it can’t be used to sign in again, it’s best to also delete the passkey at the website where you created it to avoid confusion.

Passkeys are automatically synced among all your devices by the password manager so you can take advantage of them everywhere, but note that syncing is specific to just one password manager—for instance, iCloud Keychain doesn’t sync with 1Password or other third-party managers. The authentication method varies by device, but the overall experience remains the same. 

You can also share passkeys with other people in your family or workgroup, just as you would with password-only accounts. They can log in to your passkey-protected accounts because they can prove possession (they have the passkey) and presence (they’re authenticating). In essence, you’re saying, “This person is authorized to act as the account holder.”

Passkey Concerns

Although passkeys are a big step forward in usability and security compared to passwords, they’re not without limitations or concerns, which have slowed adoption:

  • Account recoverability: Because passkeys are tied to devices, if a user loses all their devices and doesn’t have a cloud backup option (such as registering a new iPhone to an existing Apple Account or adding a new device to a 1Password account), it’s impossible to recover an account. This is primarily a concern for those who have only a single device and no one with whom to share.
  • Sharing hurdles: If you want to give someone else passkey access to an account—perhaps a shared bank account—you must log in on their device and then create an additional passkey that is stored on their device. 
  • Lack of portability: Although passkeys can be synced between devices using the same platform (iCloud Keychain, 1Password account, etc.), there’s no way to export a passkey from one platform and import it into another. You have to recreate passkeys from scratch for each platform. Vendors are working on the problem, but as you can imagine, enabling export/import opens up security concerns. 
  • User confusion: People are, understandably, still unfamiliar with passkeys, leading many to avoid them on principle. It hasn’t helped that using passkeys is slightly different on every website. The industry is working to standardize the user experience, but we’re not there yet.
  • Passwords still exist: No major websites allow passkey-only accounts. Since all accounts still have passwords that can be stolen, passkeys aren’t increasing security nearly as much as they could.
  • Enterprise support: Large organizations want to know if a passkey was generated on a secure device, if it can be revoked or rotated, and if the user employing the passkey has truly been verified. Support for these requirements is still evolving.
  • Digital inheritance: When passkey-only accounts become commonplace in the future, passkeys may be more challenging to manage in situations involving the user’s death. For now, the solution is to share passkey-protected accounts with family members in advance using a password manager. The industry would do well to establish standards around this inevitability.

Nonetheless, the perfect shouldn’t be the enemy of the good. Passkeys improve on passwords in both usability and security, and the best way to get to an easier, more secure future is to start using passkeys wherever possible today.

(Featured image by iStock.com/tanit boonruen)

Make Sure to Check Settings on Multiple Devices

We recently helped someone having trouble with 1Password requesting their password repeatedly on their iPad, but not on their iPhone. Since 1Password’s data syncs between devices, this person didn’t realize they needed to configure the app’s security settings separately for each device. It’s appropriate for 1Password to separate security settings—one device could be used in a much more sensitive environment than another—but it’s also easy to see how a user might be confused about the difference in behavior. All this is to say that if you are annoyed by an app or operating system behaving differently depending on the device you’re using, compare the settings and ensure they’re set appropriately for each device.

(Featured image based on an original by iStock.com/towfiqu ahamed)

Why Every Business Needs an AI Policy

Are employees at your company surreptitiously using artificial intelligence tools like ChatGPT, Claude, Copilot, and Gemini for everyday business tasks? It’s likely. An October 2024 Software AG study found that half of all employees use “shadow AI” tools to enhance their productivity, and most would continue using them even if explicitly banned by their employer.

Increased productivity is a good thing, but unsanctioned and unregulated AI use poses risks. A February 2025 TELUS Digital survey found that 57% of enterprise employees admit to entering high-risk information into publicly available chatbots. This includes personal data about employees or customers, product or project details, and confidential financial information like revenues, profit margins, budgets, and forecasts.

A clear AI policy will help a business minimize the risks of using AI tools. These risks include leaks of confidential information, compliance failures, accidental copyright violations, and reputational damage. As AI becomes a routine part of knowledge work, every business—even small firms—must establish an AI policy to maximize the benefits of using AI while safeguarding the company, its employees, and its clients.

Risks Addressed by a Formal AI Policy

Unauthorized AI use can create several types of problems:

  • Data security: Employees routinely paste sensitive data—including customer information, financial records, and unreleased products—into public AI tools, thereby losing control over how that data is used. That can make security audits nearly impossible and drive IT staff crazy. Notably, the free versions of ChatGPT (by default, it can be turned off) and Google’s Gemini can incorporate user data into their training models, making it possible that the information could be included in a discussion with someone else.
  • Legal and compliance risks: Sharing protected information with non-compliant AI systems could result in penalties during regulatory audits, even if no actual data breach or harm occurs. For instance, using such systems to summarize patient records could violate HIPAA, while using them to analyze customer data could run afoul of the California Consumer Privacy Act (CCPA).
  • Unintentional discrimination: Without clear guidelines, the use of AI can lead to unintentional discrimination in hiring, customer service, and decision-making. This may violate ethical standards and expose the company to legal liability.
  • Employee confusion: The lack of a coherent AI policy leads to inconsistent practices and uncertainty about acceptable tools and proper procedures, resulting in reduced productivity and increased anxiety about AI use.

Essential Elements of an AI Policy

The specifics of an AI policy vary by the type and size of company, but at minimum, most AI policies should include the following:

  • Permitted AI uses and tools: Clear guidelines on the types of tasks employees may undertake with AI assistance and a list of approved AI platforms for business activities
  • Data privacy and legal compliance: Rules for safeguarding confidential, personal, and proprietary information when using AI, coupled with rules that ensure adherence to relevant industry-specific regulations and privacy laws
  • Human oversight and transparency: Requirements that employees thoroughly review AI-generated content before use and disclose AI involvement when appropriate in client-facing or public materials
  • Risk reporting and incident response: Clear instructions for reporting AI-related errors, security incidents, or potential misuses
  • Ownership and intellectual property clarifications: Statements affirming that work products created with AI assistance belong to the company. These statements should also address any intellectual property considerations.

Building Your AI Policy

If your company doesn’t already have an established process for generating policies, AI tools can themselves provide a starting point when used thoughtfully. Here’s an approach:

  1. Prompt an AI tool like ChatGPT or Claude to generate a basic AI policy template. Be explicit about your company’s size, industry, and other relevant details, and be sure to specify that it must cover the elements listed above—you can paste them in. Iterate as necessary until the template has all the required sections.
  2. Review the generated template carefully, removing generic content and noting areas that need company-specific details.
  3. Ask for feedback on the draft from key stakeholders, including:
    • Leadership to align with company goals and values
    • IT team to verify technical feasibility and security measures
    • Legal counsel to ensure compliance with relevant regulations
    • Department heads to confirm that it will be practical to implement the policy
  4. Incorporate the feedback to create a policy that reflects your company’s specific needs while maintaining necessary protections.

Remember: An AI-generated template is for starting the conversation. The final policy must be tailored to your organization’s specific needs and thoroughly vetted by relevant stakeholders.

The rise of AI tools in the workplace isn’t just a trend—it’s a fundamental shift in how work gets done. Whether your employees are already using AI tools without oversight or are hesitant to use them due to uncertainty, now is the time to establish a formal AI policy. Start with the template approach outlined above, engage your stakeholders, and develop guidelines that work for your organization. A well-crafted AI policy will help your business harness the benefits of AI while minimizing its risks.

(Featured image by iStock.com/girafchik123)

With iOS 18.2 and Later, You Can Share the Location of Lost Items in Find My

In iOS 18.2, Apple enhanced the Find My app, enabling you to create a temporary Web page that shares the location of a lost AirTag or other Find My-tracked item. You don’t need to know the person’s email address or share any other information, and the link automatically expires after a week. It’s a great way to enlist others in the search for a lost item, but the big win is sharing with an airline to help them track the location of misdirected luggage. It’s easy: open the Find My app, tap Items, select the desired AirTag or other item, tap Share Item Location, and then share the provided link via text message, email, or any other method. The item’s location automatically stops being shared if it’s reunited with you, or you can end sharing manually.

(Featured image by iStock.com/yacobchuk)

Security Precautions to Take While Traveling

When we think about digital and device security, we mostly think about the fixed locations where people spend most of their time—home, school, and work. But what about when you’re traveling? Some security concerns remain the same when you’re on the road, but new ones crop up.

We’ll assume that you already keep your devices up to date, use FileVault on Macs, have at least a six-digit iOS passcode, have strong password habits, and use multi-factor authentication wherever possible. Other options are more specific to travel.

As with our more general article about increasing security last month, we’ve divided our list of suggestions into two parts: things that everyone should do and measures that only people who worry about being specifically targeted should employ.

Sensible Travel Security Precautions for Everyone

These suggestions are appropriate for everyone who travels, and they’re aimed primarily at avoiding relatively common problems: loss, theft, data loss, and generalized snooping:

  • Focus on physical security: As a tourist, you may be targeted by thieves, so it’s important to keep your iPhone in a secure pocket whenever you’re not using it. Carry an iPad or laptop in a bag that can’t be snatched, or leave them locked or at least concealed in your hotel room.
  • Enable Find My for all your devices: You should have already done this, but if not, enable Find My to improve your chances of finding a device you lose or accidentally leave behind. It might help if the device is stolen, but local police cooperation for recovering stolen items can vary widely. Don’t attempt to recover a stolen device yourself.
  • Put AirTags in your luggage and laptop bags: AirTags can help you track down lost luggage—you can now share their locations with airlines—and prevent you from accidentally leaving bags behind. An AirTag may also help with locating a stolen item, but always work with local law enforcement.
  • Enable biometric authentication and Stolen Device Protection: Using Face ID or Touch ID wherever possible and having Stolen Device Protection enabled on your iPhone in Settings > Face/Touch ID & Passcode is even more important when traveling.
  • Use a VPN or iCloud Private Relay: Because you may be using Wi-Fi networks whose security you know nothing about, it’s best to use a VPN like Mullvad VPN, NordVPN, or ProtonVPN to encrypt all your traffic. At a minimum, use iCloud Private Relay, which requires an iCloud+ subscription and won’t encrypt traffic from most non-Apple apps.
  • Use iCloud Photos or another backup option: To ensure you don’t lose precious vacation photos, use iCloud Photos so all your photos are uploaded to the cloud whenever you have access. This will almost certainly require an iCloud+ subscription for sufficient storage space. If Wi-Fi and cellular are too slow or unavailable, consider an external SSD to which you can manually export photos and videos for backup. To speed up the process, you could create a shortcut that automatically copies all photos taken that day.
  • Use iCloud Backup: It’s best to use iCloud Backup to back up your entire iPhone every night. That way, if your iPhone is lost or destroyed, you may be able to buy a replacement and restore from backup in relatively little time. You will probably need an iCloud+ subscription to have enough backup space.
  • Practice dealing with a lost or stolen device: If the worst happens and you lose one of your devices while traveling, you need to know what to do. Immediately go to Find My on another device or iCloud.com and mark the device as lost. If there’s a chance of getting it back, stop there. However, if you believe the device was stolen, your data is at risk, and tracking it is no longer useful, use Erase This Device in Find My to wipe it. Activation Lock will remain enabled to prevent anyone from reusing the device.

Increasing Travel Security for People Who May Be Targeted

Not all travel is fondue and gamelans. If you’re a journalist, activist, government employee, or corporate executive with access to sensitive data, you could be a target while traveling. This is particularly true if you are headed to countries like China, Russia, or others with authoritarian governments and powerful intelligence agencies. Along with the suggestions above, we recommend:

  • Be aware of local laws and government practices: It’s important to read up on regional laws regarding data access and potential government capabilities at your destination. Knowing what to expect can help you reduce your risks and take appropriate precautions.
  • Use caution with cellular access: Even if your carrier allows roaming, consider using a dedicated eSIM for international travel, separate from your personal one. That way, you can use local cellular networks without revealing your home number. Be aware that your traffic may be monitored.
  • Enable Lockdown Mode: If you’re concerned about your iPhone or iPad being targeted by local law enforcement or government intelligence agencies, turn on Lockdown Mode in Settings > Privacy & Security > Lockdown Mode. To increase security, it blocks most attachment types in Messages, complex Web technologies, incoming FaceTime calls from unknown callers, non-secure Wi-Fi network connections, and incoming invitations to Apple services. Plus, it excludes location information from shared photos, requires approval to connect accessories, and more.
  • Reduce and protect your use of cloud services: While using a VPN is essential, you should still avoid using cloud services much if government entities might have access to stored files. If you need to upload files, encrypt them first using the free and open-source Cryptomator.
  • Know how to disable Face ID and Touch ID: If you find yourself in a situation where you believe you may be compelled to unlock your iPhone or iPad with your face or fingerprint, press and hold the side or top button and either volume button to display the power off slider. This temporarily disables biometric authentication, requiring your passcode for the next unlock.
  • Use dedicated travel devices and accounts: If you’re traveling to a potentially hostile part of the world, we strongly recommend carrying only devices—preferably iPhones or iPads, which are more secure than Macs—configured to contain none of your personal data or regular accounts. Keep them with you at all times, assume they could be confiscated, and be aware you might be compelled to share passcodes or other account information. Create a separate Apple Account for such devices.

Best of luck in your travels! With just a little preparation, you can reduce the chances that something bad will happen during a vacation. If you’re traveling on business to somewhere more concerning, putting in additional effort could prevent truly problematic things from happening.

(Featured image by iStock.com/metamorworks)

Apple Says More Personalized Siri Will Be Delayed

As we’ve been covering Apple’s staged rollout of Apple Intelligence, one announced feature that has remained tantalizingly in the future is the enhanced version of Siri that would have onscreen awareness, understand your personal context, and be able to interact with apps. The company has quietly admitted that this new version of Siri isn’t ready yet and now says it anticipates rolling it out in the coming year. That probably means in conjunction with some version of iOS 19 and macOS 16, expected to debut in September 2025 and receive updates through early 2026. In short, don’t expect this new Siri anytime soon. We’d prefer to see Apple get Siri to succeed at all the tasks it’s supposed to handle now—too many of the things we try to do with Siri fail.

(Featured image based on an original by iStock.com/Bogdan Malizkiy)

A Few of Our Favorite Things: Tech Edition

We’re asked to recommend tech gear year-round. Here are some recommendations if you’re looking for a geeky gift for that special someone or need to supplement your tech toolkit with new or updated equipment. We don’t have personal experience with all these items, and there are undoubtedly many worthy alternatives—next time we chat, let us know about peripherals you’ve particularly liked. Where possible, we provide links to the manufacturer’s product page and to Amazon, where prices are sometimes lower.

External SSD

All Macs now use solid-state storage internally, and the pricing of external solid-state drives now makes them attractive for both additional storage and silent backups. SSDs also provide the ultimate performance for demanding workflows. The Samsung and Crucial SSDs are good general-purpose drives; look at the OWC Envoy Pro FX for high-performance tasks.

External Hard Disk Drive

For extensive backups and massive archives, you need a large external hard drive. They come in sizes up to 20 TB, and you can pay less than $20 per terabyte, although $20–$30 per terabyte is more common. It’s impossible to recommend specific models without knowing how much storage you need, but check out products from these manufacturers. Because hard drive prices fluctuate wildly, visit diskprices.com to identify current deals on new drives.

  • Seagate: Seagate offers a collection of desktop and portable drives under its own name and the LaCie brand. Apart from some of the larger LaCie drives, most are aimed at consumers.
  • Western Digital: Although some suggest that Western Digital drives are less reliable than Seagate’s, many people like the company’s wide variety of external hard drives.
  • OWC: Other World Computing sells desktop and portable drives with an emphasis on RAID storage and professional uses. OWC also offers enclosures into which you can install bare drives purchased elsewhere, which can save money if you want to upgrade the drive over time.

External Displays

You can find a wide array of displays that work with a Mac, with Apple’s Studio Display leading the pack in both features and price. It’s a 5K display that provides unparalleled sharpness at its standard pixel-doubled resolution of 2560×1440. There’s little direct competition—LG offers the main 5K display that’s cheaper. If that still exceeds your budget, check out the 27-inch 4K displays from Alogic and Asus, which connect via USB-C. Dell and BenQ also make high-quality screens that connect using Thunderbolt. Note that these third-party displays don’t include webcams and generally feature subpar speakers compared to the Apple Studio Display, so building a comparable display would require a separate webcam (or an iPhone using Continuity Camera) and speakers.

Laptop Chargers

Although all MacBooks come with a power adapter, you might want additional chargers that stay plugged in wherever you work or take up less space in your laptop bag. Plus, Apple’s chargers, though high quality, are expensive and large. Consider these alternatives, keeping in mind that fast charging requires higher wattages than standard charging (70W for the M3 MacBook Air, 96W for the 14-inch MacBook Pro, and 140W for the 16-inch MacBook Pro). Extra ports are often welcome, and the OneAdaptr chargers work in 200 countries.

USB Hubs

There are lots of reasons to want a USB hub, and your needs will push you toward one product or another. We chose three options: the Anker 555 provides many different types of ports, the Anker 10-port hub provides numerous USB Type-A ports, and the Satechi 4-port hub offers USB-C ports.

Thunderbolt Docks

USB hubs are sufficient for many situations, but for more demanding setups, you’ll want a Thunderbolt dock that enables you to connect multiple external displays, hard drives, and Gigabit Ethernet, all while using high-wattage charging. The Sonnet and CalDigit docks boast the most ports in horizontal and vertical form factors, respectively, and the OWC dock trades some ports for portability.

Non-Apple Pointing Devices

Some people dislike trackpads, and others aren’t fond of Apple’s Magic Mouse. Luckily, there are plenty of alternatives. Although most Bluetooth mice will work with the Mac, additional software may be necessary to control tracking speed, extra buttons, or scroll wheels. Unusual pointing devices like the Kensington trackball and Contour RollerMouse may be appreciated by those suffering from hand or wrist pain from mousing.

Non-Apple Mac Keyboards

All Macs other than the Mac mini come with a keyboard, of course, but if you’re not a fan of the feel and minimal key travel of Apple’s keyboards, you might consider an alternative. You’ll need to decide if you want a full-size keyboard with a numeric keypad or a compact keyboard that takes up less space on your desk—there are also various sizes in between. Also, keyboards use different switches under their keycaps, so it may require experimentation to find what you like best. It’s worth buying a keyboard aimed at the Mac market to ensure it has or can be configured with the correct keys. The recommendations below should get you started; also check out other products from these manufacturers.

iPad Keyboards

Apple makes some of the best keyboards for the iPad, but they don’t work with all older models. The company makes the Magic Keyboard for the M4 iPad Pro models, the Magic Keyboard that works with the iPad Air and earlier iPad Pro models, and the Magic Keyboard Folio for the 10th-generation iPad. If you want to spend less, leave out the trackpad, or have a different case design, look into the alternatives.

Small Device External Batteries

Although Apple continuously works to improve battery life for the iPhone, iPad, Apple Watch, and AirPods, there will always be situations—travel, camping, non-stop use—where an external battery is a lifesaver. That’s especially true for older devices whose batteries don’t last as long as they used to.

MagSafe Chargers for the iPhone

Wired charging will always be faster and more efficient than wireless charging, but the convenience of MagSafe charging for the iPhone is compelling. As a bonus, MagSafe chargers can also power wireless charging cases for the AirPods Pro, and some, like the KUXIU X55, feature a puck for recharging the Apple Watch.

Let us leave you with a final piece of advice. For many of these product categories, you’ll find a dizzying array of alternatives at bargain basement prices from no-name Chinese manufacturers. While it’s impossible to make blanket assertions, we recommend sticking with reputable companies that have been serving Apple users for years. Even if their products are somewhat more expensive, they’re less likely to cut corners on manufacturing quality and safety and more likely to provide support in the event of problems.

(Featured image by iStock.com/Gatot Adriansyah)

Keep Your Browsing Organized with Browser Profiles

As more of our lives shift online, it becomes increasingly important to establish boundaries between different aspects of our digital activities. Many people maintain separate work and personal email addresses for this reason. But you don’t have to stop there.

Modern Web browsers offer profiles, a powerful but often overlooked feature. Whether you’re juggling work and personal browsing or managing multiple projects, browser profiles can make your digital life more organized and efficient.

Why Use Browser Profiles?

The overarching reason to use browser profiles is to make it easier to focus on one thing at a time. Imagine you’re working on a bathroom remodel at home while negotiating a new contract with an important client at work. You probably don’t want to be distracted by tabs showcasing countertop surfaces when you should be estimating client deliverable dates. That’s especially true if you use the same Web apps—Gmail, Google Docs, Slack, Trello—to manage both personal and professional projects.

By setting up separate browser profiles, you can keep your work and personal browsing completely separate. That includes different bookmarks, sets of tabs, and account logins for the same websites. When you open Google Docs in your personal profile, you will find sheets that track the timeline for your bathroom remodel in your personal account; switch to your work profile to view only documents in your work account.

Other common uses for browser profiles include separating clients—particularly when managing accounts for them—keeping research projects or hobbies distinct, and maintaining a clean browser environment for testing.

What’s Stored in a Browser Profile?

Each browser profile maintains its own distinct set of browsing data and settings. While specifics may vary slightly among browsers, options include:

  • Bookmarks/favorites: Saved websites, possibly in hierarchical folders
  • Browsing history: The chronological list of websites you have visited
  • Saved passwords: Login credentials for websites if you rely on the browser rather than an independent password manager
  • Extensions and their settings: Which browser extensions are installed and how they’re configured
  • Cookies and site data: These store website preferences, login status, and site-specific information
  • Stored forms and autofill data: Saved addresses, payment methods, and other form data
  • Browser settings and preferences: Search engine preferences, home page and startup settings, theme and appearance options, and privacy and security settings
  • Open tabs and windows: Including tab groups and recently closed tabs

When you switch between profiles, you get a completely fresh browser environment with its own set of everything listed above. You can log in to the same website using different accounts in various profiles, and your activity in one profile won’t impact or be visible in another.

Setting Up and Switching Between Profiles

Getting started with profiles is simple. Here’s how to create and switch between them in Safari (in macOS 14 Sonoma and later), Google Chrome, and Firefox. Before you get started, though, a few tips:

  • Give profiles descriptive names and distinct colors so they’re easy to identify.
  • Keep the number of profiles manageable because too many can become confusing.
  • If you create profiles for clients or projects, periodically review and tidy up unused ones.
  • Keep in mind that profiles are intended for organization and efficiency, not security—anyone with access to your Mac can switch to any profile.
  • Chrome and Firefox profiles are stored on a particular computer—they won’t sync with another copy of those browsers on another computer.

Safari

Safari profiles share more data than those in Google Chrome and Firefox, and unlike the other two, Safari profiles automatically sync between devices. All bookmarks and saved passwords are accessible to all profiles, although you can choose a separate primary bookmark folder for each profile. Note that Safari stores its current settings in a permanent Personal profile that becomes visible only after you create a new one. To create a new profile in Safari:

  1. Choose Safari > Settings > Profiles.
  2. If this is your first new profile, click Start Using Profiles. Otherwise, click + to create a new profile.
  3. Enter a name, and choose a symbol and color.
  4. Select a folder within your bookmarks to hold the profile’s primary bookmarks.
  5. Click Create Profile.
  6. Choose how new windows and tabs open.
  7. Click the Extensions tab, and select the extensions you want to use with the profile.

Every window in Safari is associated with a profile, so switching between them can be as simple as clicking another window or using the Window menu. At most, you have to open a new window for the desired profile:

  • Choose File > New Profile Window. If you have three or more profiles, the command becomes File > New Window > New Profile Window.
  • With the sidebar closed, click the profile button and choose New Profile Window to create a new window. When viewing the Start page, you can choose Switch to Profile Window to change the profile for the current window.

Google Chrome

Google Chrome has had browser profile support for many years. Like Safari, you start with a default profile. To create a new profile in Chrome:

  1. Choose Profiles > Add Profile. Click to continue without an account or sign in with a different Google account.
  2. Enter a name and pick an icon for the profile.
  3. If desired, choose Chrome > Settings to adjust settings and active extensions for the new profile.

Every window is associated with a profile, so switching is often just a matter of clicking the desired window or choosing it from the Window menu. To open a window for a different profile:

  • Choose Profiles > MyProfile.
  • Click the profile icon in the toolbar and choose the profile you want.

Once you have multiple Chrome profiles, the app will ask you which to open on each launch. From this screen, you can also remove a profile by clicking the vertical dot menu and choosing Delete. If you deselect “Show on startup,” Chrome will open the last used profile at startup. You can always access this screen by clicking the profile icon in the toolbar and choosing Manage Chrome Profiles.

Firefox

Although Firefox was the first browser to support profiles, they remain poorly integrated into its interface and can be confusing because each opens in another instance of Firefox— a new Firefox icon appears in the Dock for each. To create a new profile in Firefox:

  1. Type about:profiles in the address bar to open the About Profiles page.
  2. Click Create a New Profile.
  3. Name your profile and optionally select a custom location for profile storage.
  4. On the About Profiles page, in the listing for your new profile, click “Launch profile in new browser” to open a new instance of Firefox with it.
  5. Configure this new instance of Firefox as desired.

Opening a new profile instance can be tricky since it’s essentially like opening another app, but there’s only one Firefox icon in your Applications folder. While there are command-line tricks to make switching easier, this is the simplest approach:

  1. Type about:profiles in the address bar to open the About Profiles page.
  2. In the listing for the profile, click “Launch profile in new browser.”

To simplify this process, open the About Profiles page in each profile and drag its proxy icon to the Bookmarks toolbar. That way, you can click the bookmark in the toolbar for quick access to About Profiles.

Once multiple profile instances are open, you can switch between them by clicking their windows or Dock icons.

Be Careful with External Links

Browser profiles struggle with one scenario: opening links from other apps. Imagine you’re busy in your Work profile but take a quick break to check your personal email. You receive a link from your bathroom designer with possible lighting options, so you click it. Since your browser is using your Work profile, the link opens there, and you have to transfer it manually to your Personal profile or risk muddying your organization.

However, this is a minor obstacle, given how beneficial browser profiles can be for organizing your online activities, whether you’re juggling multiple projects or simply keeping your work and personal browsing distinct.

(Featured image generated by ChatGPT)

Share Wi-Fi Network Passwords Using QR Codes

A neat feature built into iOS, iPadOS, and macOS is that when you are connected to a Wi-Fi network, your devices will offer to share the Wi-Fi password if others near you try to connect to the same network. However, for this feature to work, they must be in your Contacts, and at times, it doesn’t activate as quickly as you’d like. Apple’s new Passwords app on an iPhone, iPad, or Mac provides a manual alternative that may work better. Tap the Wi-Fi collection to see all your remembered networks, select the desired network, and tap Show Network QR Code. When others scan the QR code using their phones, they will instantly join the network.

(Featured image by iStock.com/PrathanChorruangsak)